Address space layout randomization

Results: 175



#Item
141Failure / Hacking / Vulnerability / Patch / Address space layout randomization / Social vulnerability / Arbitrary code execution / Computer security / Cyberwarfare / Software testing

Immunity White Paper A Bounds Check on the Microsoft Exploitability Index Bas Alberts, Senior Researcher, Immunity, Inc[removed]

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2009-01-13 10:48:07
142Shellcode / Software bugs / Buffer overflow / Polymorphic code / Arbitrary code execution / Self-modifying code / Computer virus / Address space layout randomization / Metasploit Project / Computing / Computer security / Cyberwarfare

J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:25:58
143Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-28 17:28:59
144Software bugs / Cross-platform software / Heap spraying / Shellcode / Buffer overflow / Address space layout randomization / NOP slide / JavaScript / Garbage collection / Computing / Cyberwarfare / Computer security

N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-06-08 14:53:11
145Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2010-12-28 00:16:40
146Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: vreugdenhilresearch.nl

Language: English - Date: 2010-03-24 14:09:15
147Software bugs / Address space layout randomization / PaX / Buffer overflow / Stack buffer overflow / Heap overflow / JIT spraying / Uncontrolled format string / Heap spraying / Computer security / Computing / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-07-17 11:27:12
148C Standard Library / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / MOV / X86 / Printf format string / Computing / Computer architecture / Software bugs

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:37
149Software engineering / Return-to-libc attack / Address space layout randomization / PaX / Buffer overflow / NX bit / Exec Shield / Stack overflow / Stack / Software bugs / Computing / Software quality

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-12-31 02:53:49
150System software / Return-to-libc attack / PaX / Address space layout randomization / NX bit / Buffer overflow / Exec Shield / Stack / ASCII / Software bugs / Computing / Software

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:43
UPDATE